Abstract is missing.
- Secure Outsourcing Image Feature Extraction: Challenges and SolutionsKui Ren. 1 [doi]
- Entangled Encodings and Data EntanglementGiuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi. 3-12 [doi]
- Armadillo: A Compilation Chain for Privacy Preserving ApplicationsSergiu Carpov, Paul Dubrulle, Renaud Sirdey. 13-19 [doi]
- Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended AbstractShlomi Dolev, Niv Gilboa, XiMing Li. 21-29 [doi]
- Fully Secure Inner-Product Proxy Re-Encryption with Constant Size CiphertextMichael Backes 0001, Martin Gagné, Sri Aravinda Krishnan Thyagarajan. 31-40 [doi]
- Certificateless Proxy Re-Encryption Without Pairing: RevisitedAkshayaram Srinivasan, C. Pandu Rangan. 41-52 [doi]
- Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic EncryptionMasaya Yasuda, Takeshi Koshiba, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama. 53-61 [doi]
- Authorization Federation in IaaS Multi CloudNavid Pustchi, Ram Krishnan, Ravi S. Sandhu. 63-71 [doi]
- Data Freshness for Non-Trusted Environments Using Disposable CertificatesKevin Koerner, Thomas Walter, Michael Menth. 73-80 [doi]